首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1012篇
  免费   62篇
各国政治   52篇
工人农民   146篇
世界政治   93篇
外交国际关系   53篇
法律   518篇
中国政治   14篇
政治理论   195篇
综合类   3篇
  2024年   2篇
  2023年   17篇
  2022年   8篇
  2021年   14篇
  2020年   28篇
  2019年   50篇
  2018年   63篇
  2017年   81篇
  2016年   77篇
  2015年   42篇
  2014年   44篇
  2013年   145篇
  2012年   55篇
  2011年   53篇
  2010年   33篇
  2009年   45篇
  2008年   48篇
  2007年   52篇
  2006年   48篇
  2005年   30篇
  2004年   16篇
  2003年   13篇
  2002年   13篇
  2001年   8篇
  2000年   4篇
  1999年   10篇
  1998年   7篇
  1997年   6篇
  1996年   4篇
  1995年   8篇
  1994年   5篇
  1993年   6篇
  1992年   4篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   2篇
  1987年   3篇
  1986年   3篇
  1985年   5篇
  1984年   4篇
  1983年   5篇
  1982年   4篇
  1980年   1篇
  1978年   1篇
  1974年   2篇
排序方式: 共有1074条查询结果,搜索用时 171 毫秒
81.
Forgotten heroes     
Ephron D  Childress S 《Newsweek》2007,149(10):28-37
  相似文献   
82.
Despite the immense popularity of offender profiling as both a topic of fascination for the general public as well as an academic field of study, concerns have been raised about the development of this area of scientific inquiry. The present study provides a preliminary step towards moving the field forward as it reviews the type and quality of studies dealing with offender profiling over the past 31 years. Based on a content analysis of 132 published articles, the review indicates that researchers investigating this phenomenon rarely publish multiple articles, and they are generally reported across many different journals, thereby making knowledge synthesis and knowledge transfer problematic. In addition, the majority of papers published in the area are discussion pieces (e.g., discussing what profiling is, how profiles are constructed, and when profiling is useful), despite the fact that the processes underlying offender profiling are still not well understood. Finally, although peer-reviewed articles exploring this topic have steadily increased, the statistical sophistication of these studies is sorely lacking, with most including no statistics or formal analyses of data. Suggestions for future research and recommendations to streamline efforts in this field are provided based on the results of this review.
Craig BennellEmail:
  相似文献   
83.
Between the 1999 and 2009 elections the proportion of national female legislators in Indonesia, the world's largest Muslim majority democracy, more than doubled. While this substantial increase may partly be explained by the recent imposition of a gender quota and placement mandate that have forced parties to increase the number of female candidates, quotas cannot fully explain the strong performance of women in the 2009 elections. First, many parties placed women higher on their lists than the laws required; second, voters appeared to over vote for women in some districts. Although incumbency's typical effect is to inhibit female electoral success by advantaging traditional (male) competitors, I argue that women benefited largely from an alternative effect: female incumbency can improve female candidate placement and electability by demonstrating female capacity and capability. Female newcomers benefited strongly from the presence of female incumbents in their own and bordering districts, thus suggesting a positive diffusion effect of female incumbency.  相似文献   
84.
The Supreme Court's unanimous decision in Belmont Park Investments Pty Ltd v BNY Corporate Trustee Services Ltd and Lehman Brothers Special Financing Inc is of major significance to lenders, especially those in the global structured finance market. This case confirms the validity of commonly used insolvency‐triggered secured‐priority flip clauses, and, more generally, suggests a dramatically reduced role for the common law anti‐deprivation principle. The decision may not fully resolve market uncertainty, however, given the particular analysis adopted in the case itself (analysed here) and its divergence from the US statutory approach to the same principle.  相似文献   
85.
The “cloud” is not new, and its roots go back to the original plans for computing from the 1950s. Now that computing is moving back to the original cloud-based models that were envisioned more than 60 years ago, with it, consumers are realizing the increases in security and safety that accompany the move to centralized servers. Yet the perception of “trust” in this context is often still formed by views that people have from their use of computers over the past two decades, which is localized in nature (“if I can see it, I can control it”). This view is based on perception more than fact. Our paper discusses different views of trust in other contexts (such as banking and travel) and concludes that users of cloud computing should recast their view of trust in a similar way that consumers of banking and travel have changed their perceptions of trust in the last 100 years.  相似文献   
86.
87.
88.
The present study investigates victim sexual orientation in a sample of 641 violent crime victims seeking emergency medical treatment at a public-sector hospital. Victim sexual orientation was examined as it: (a) varies by type of violent crime and demographic characteristics, (b) directly relates to psychological symptoms, and (c) moderates the relationship between victim and crime characteristics (i.e., victim gender, victim trauma history, and type of crime) and psychological symptoms (i.e., symptoms of acute stress, depression, panic, and general anxiety). Results showed that lesbian, gay, bisexual, and transgender (LGBT) victims were more likely to be victims of sexual assault. Heterosexual victims were more likely to be victims of general assault and shootings. LGBT victims demonstrated significantly higher levels of acute stress and general anxiety. Moreover, victim sexual orientation moderated the association of type of crime with experience of panic symptoms. Also, victim sexual orientation moderated the relation of victim trauma history and general anxiety symptoms. Results are discussed in relation to victimization prevalence rates, sexual prejudice theory, and assessment and treatment of violent crime victims.  相似文献   
89.
Intimate partner violence (IPV) often includes economic abuse as one tactic commonly used by an abuser; unfortunately, there is a lack of empirical understanding of economic abuse. Additionally, research is limited on the predictors of economic self-sufficiency in the lives of women experiencing IPV. This paper furthers our knowledge about economic abuse and its relationship with economic self-sufficiency by presenting the results from an exploratory study with IPV survivors participating in a financial literacy program. Of the 120 individuals who participated in the first wave, 94% experienced some form of economic abuse, which also correlated highly with other forms of IPV. Seventy-nine percent experienced some form of economic control, 79% experienced economic exploitative behaviors, and 78% experienced employment sabotage. MANOVA results also indicated that economic control differed significantly based on education with those with a high school education experiencing higher rates than those with less than high school education or those with some college. Finally, results from the OLS regressions indicated that experiencing any form of economic abuse as well as economic control significantly predicted a decrease in economic self sufficiency. Implications suggest that advocates should assess for economic abuse when working with survivors and should be prepared to offer financial tools to increase survivors' economic self-sufficiency. Policymakers should understand the ramifications of economic abuse and create policies that support survivors and prohibit economic abuse. Finally, more research is needed to fully understand economic abuse and its impact on survivors and their economic self-sufficiency.  相似文献   
90.
Farming and agribusiness could help employ and reintegrate conflict-affected youth in regions recovering from civil conflict. This study addresses the constraints for youth to engage themselves in agribusiness in the worst conflict-affected regions of northern Uganda. Specifically, it explores to what extent beekeeping and honey business offer viable socio-economic opportunities to formerly displaced youth. Using a value chain approach, the study draws on in-depth interviews with 23 (young) key stakeholders in the honey value chain, document analysis and focus group discussions. The results suggest that apiculture business can create employment for conflict-affected youth in northern Uganda due to the relatively low entry barriers, a young enthused vanguard and higher returns per unit input compared to other agricultural sectors in the region. However in order to succeed, this group requires support from community elders, government and business facilitators, because, due to their age and war background, these youngsters face the common constraints to farming and agribusiness, but at higher degrees of severity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号